Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- #antcenter (2)
- Image processing--Digital techniques (2)
- Pattern recognition systems (2)
- Wireless communication systems (2)
- Ad hoc networks (Computer networks)--Simulation methods (1)
-
- Artificial satellites in navigation (1)
- Computer networks--Security measures (1)
- Computer security (1)
- Computers--Access control (1)
- Data encryption (Computer science) (1)
- Doppler radar (1)
- Electromagnetic waves--Measurement (1)
- Electronic data processing--Auditing (1)
- Electronic noise (1)
- Global Positioning System (1)
- Imaging systems (1)
- Intelligent agents (Computer software) (1)
- Linux (1)
- Pattern perception (1)
- Radar (1)
- Radar--Simulation methods (1)
- Radiofrequency spectroscopy (1)
- Three-dimensional imaging (1)
- War--Computer simulation (1)
- Wave guides--Materials--Testing (1)
Articles 1 - 14 of 14
Full-Text Articles in Engineering
A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest
A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest
Theses and Dissertations
Persistent surveillance of the battlespace results in better battlespace awareness which aids in obtaining air superiority, winning battles, and saving friendly lives. Although hyperspectral imagery (HSI) data has proven useful for discriminating targets, it presents many challenges as a useful tool in persistent surveillance. A new sensor under development has the potential of overcoming these challenges and transforming our persistent surveillance capability by providing HSI data for a limited number of pixels and grayscale video for the remainder. The challenge of exploiting this new sensor is determining where the HSI data in the sensor's field of view will be the …
Applying Image Matching To Video Analysis, Adam J. Behring
Applying Image Matching To Video Analysis, Adam J. Behring
Theses and Dissertations
Dealing with the volume of multimedia collected on a daily basis for intelligence gathering and digital forensics investigations requires significant manual analysis. A component of this problem is that a video may be reanalyzed that has already been analyzed. Identifying duplicate video sequences is difficult due to differences in videos of varying quality and size. This research uses a kd-tree structure to increase image matching speed. Keypoints are generated and added to a kd-tree of a large dimensionality (128 dimensions). All of the keypoints for the set of images are used to construct a global kd-tree, which allows nearest neighbor …
Attaining Realistic Simulations Of Mobile Ad-Hoc Networks, Derek J. Huber
Attaining Realistic Simulations Of Mobile Ad-Hoc Networks, Derek J. Huber
Theses and Dissertations
Mobile Ad-hoc Networks (MANET) are comprised of wireless systems that communicate without the assistance of centrally managed routers or base stations. MANET research and development has increased due to computing technologies offering smaller, faster, smarter, and more power efficient platforms to operate on. Largely the testing and evaluation of new and existing MANET protocols has resided in simulation environments. This is due in part to the complexities and expenses incurred when conducting real world tests. Many researchers have come to recognize that these current simulations tend to assume away critical components of the MANET domain. These assumptions are made either …
Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien
Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien
Theses and Dissertations
To address the group key management problem for modern networks this research proposes a lightweight group key management protocol with a gossip-based dissemination routine. Experiments show that by slightly increasing workload for the key update mechanism, this protocol is superior to currently available tree-based protocols with respect to reliability and fault tolerance, while remaining scalable to large groups. Java simulations show that the protocol efficiently distributes keys to large groups in the midst of up to 35 percent node failure rates. In addition, it eliminates the need for logical key hierarchy while preserving an overall reduction in rekey messages to …
Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady
Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady
Theses and Dissertations
Computing systems are used in virtually every aspect of our lives. Technology such as smart phones and electronically controlled subsystems in cars is becoming so commonly used that it is virtually ubiquitous. Sometimes, this technology can be exploited to perform functions that it was never intended to perform, or fail to provide information that it is supposed to protect. X-HIA was shown to be effective at identifying several circuit components in a significantly shorter time than previous identification methods. Instead of requiring a number of input/output pairings that grows factorially or exponentially as the circuit size grows, it requires only …
Improved Multispectral Skin Detection And Its Application To Search Space Reduction For Dismount Detection Based On Histograms Of Oriented Gradients, Adam L. Brooks
Theses and Dissertations
Due to the general shift from conventional warfare to terrorism and urban warfare by enemies of the United States in the late 20th Century, locating and tracking individuals of interest have become critically important. Dismount detection and tracking are vital to provide security and intelligence in both combat and homeland defense scenarios including base defense, combat search and rescue (CSAR), and border patrol. This thesis focuses on exploiting recent advances in skin detection research to reliably detect dismounts in a scene. To this end, a signal-plus-noise model is developed to map modeled skin spectra to the imaging response of an …
Spectral Domain Rf Fingerprinting For 802.11 Wireless Devices, Sheldon A. Munns
Spectral Domain Rf Fingerprinting For 802.11 Wireless Devices, Sheldon A. Munns
Theses and Dissertations
The increase in availability and reduction in cost of commercial communication devices (e.g. IEEE compliant such as 802.11, WiFi, 802.16, Bluetooth etc.) has increased wireless user exposure and the need for techniques to properly identify/classify signals for increased security measures. Communication device emissions include intentional modulation that enables correct device operation. Hardware and environmental factors alter the ideal response and induce unintentional modulation effects. If these effects (features) are sufficiently unique, it becomes possible to identify a device using its fingerprint, with potential discrimination of not only the manufacturer but possibly the serial number for a given manufacturer. Many techniques …
Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.
Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.
Theses and Dissertations
Communication network simulations have typically been visualized in the past through 2D representations, but this is insufficient for battlefield network scenarios. Visual representations of battlefield networks greatly benefit from 3D visualization due to its ability to retain asset location. This research investigates the feasibility of modeling a typical battlefield communication network in a realistic 3D manner and discusses the effects of doing so. The result is an open source, 3D network visualization tool that can create highly intuitive connected battlefield scenes, enabling the user to quickly comprehend network state. It highlights mobile assets, packet movement, and node connectivity while allowing …
Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai
Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai
Theses and Dissertations
Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address …
Toward A Mobile Agent Relay Network, Hyon H. Kwak
Toward A Mobile Agent Relay Network, Hyon H. Kwak
Theses and Dissertations
Although wireless communication provides connectivity where hardwired links are difficult or impractical, it is still hindered by the environmental conditions where the communicators reside. Signal loss over large distances or because of intervening obstacles can be mitigated by increasing the user's transmission power or adding repeater nodes between the users. Unfortunately, increasing the signal strength strains limited power resources and increases the likelihood of eavesdropping. Stationary repeaters are impractical for highly mobile users in dangerous environments. While mobile relay nodes might be a preferred solution, a centralized control scheme saps bandwidth from important traffic and introduces a single point of …
Application Of The Three Short Calibration Technique In A Low Frequency Focus Beam System, William E. Gunn Jr.
Application Of The Three Short Calibration Technique In A Low Frequency Focus Beam System, William E. Gunn Jr.
Theses and Dissertations
Electromagnetic material characterization is the process of determining the constitutive parameters of matter. In simple media, these parameters are permittivity and permeability. Characterization of these values is often accomplished through the use of waveguides, transmission lines, coaxial cables, and resonant cavities. Free space measurements systems are employed since they are non destructive (i.e., no sample machining is required) and broadband. Traditionally, time domain gating is utilized to mitigate systematic errors. However, an artifact of this calibration technique is band edge corruption due to data windowing. The goal of this research is to develop and apply a Three Short Calibration Technique …
An Approach To Large Scale Radar-Based Modeling And Simulation, Lester C. Long Iv
An Approach To Large Scale Radar-Based Modeling And Simulation, Lester C. Long Iv
Theses and Dissertations
This research presents a method of aggregating, or reducing the resolution, of a commonly available Department of Defense (DoD) simulation. It addresses the differences between varying levels of resolution and scope used in the DoD’s hierarchy of models pyramid. A data representation that aggregates engagement-level simulation data to use at a lower resolution level, the mission-level, is presented and analyzed. Two formats of implementing this data representation are developed and compared: the rigid cylinder format and the expanding tables format. The rigid cylinder format provides an intuitive way to visualize the data and is used to develop the theory. The …
Global Navigation Satellite System Software Defined Radio, Jason M. Mcginthy
Global Navigation Satellite System Software Defined Radio, Jason M. Mcginthy
Theses and Dissertations
The GNSS world is quickly growing. The United States’ GPS, the European Union’s Galileo, China’s Compass, and Russia’s GLONASS systems are all developing or modernizing their signals, and there will soon be more navigation satellites in space than ever before. The goal of this research was to develop an initial capability for an AFIT GNSS software receiver. This software receiver is intended to be used for research purposes at the Advanced Navigation Technology (ANT) Center. First a GPS-only software receiver was built. It successfully acquired, tracked, and provided reasonable position estimates. Next, the receiver was successfully modified to acquire and …
Development And Evaluation Of A Multistatic Ultrawideband Random Noise Radar, Matthew E. Nelms
Development And Evaluation Of A Multistatic Ultrawideband Random Noise Radar, Matthew E. Nelms
Theses and Dissertations
This research studies the AFIT noise network (NoNET) radar node design and the feasibility in processing the bistatic channel information of a cluster of widely distributed noise radar nodes. A system characterization is used to predict theoretical localization performance metrics. Design and integration of a distributed and central signal and data processing architecture enables the Matlab®-driven signal data acquisition, digital processing and multi-sensor image fusion. Experimental evaluation of the monostatic localization performance reveals its range measurement error standard deviation is 4.8 cm with a range resolution of 87.2(±5.9) cm. The 16-channel multistatic solution results in a 2-dimensional localization error of …